Case File
efta-01376009DOJ Data Set 10OtherEFTA01376009
Date
Unknown
Source
DOJ Data Set 10
Reference
efta-01376009
Pages
1
Persons
0
Integrity
Extracted Text (OCR)
Text extracted via OCR from the original document. May contain errors from the scanning process.
From:
Sent:
To:
Subject:
May 16,2016 4:14:31 PM Conversation M6669994
# Intera
formation
interlD:
startlime: 2016-05-16116:14:31-0400
endTime: 2016-05-16116:31:38-0400
employeelD
buddyName:
networklD: MicrosoftUC
employeelPAddr: 10.98.134.238
serverName: Zantaz
dbID:
deploymentlD:
outgoingFlag: false
supervisedFlag: true
internalFlag: true
roomName:
# Start of interaction
# Participant
# Participant
buddyName:
networklD:
employeelD:U
# End of participant information
microsoftuC
epstein accou
microsoftUC
information
entered on 2016-05-16116:14:31-0400
(2016-05-16116:14:31-0400): you saw my email about the fraud on the
Microsoftuc
(2016-05-16116:21:24-0400): Yes, thanks. Paul is going to sort that
out. Hopefu y e wont e eaving admin potholes like 3) did
Microsoftuc
(2016-05-16116:21:38-0400): i hope
# Participant microsoftuc
left on 2016-05-161-16:31:38-0400
# End of interaction
CONFIDENTIAL - PURSUANT TO FED. R. CRIM. P. 6(e)
DB-SDNY-0071741
CONFIDENTIAL
SDNY_GM_00217925
EFTA01376009
Technical Artifacts (2)
View in Artifacts BrowserEmail addresses, URLs, phone numbers, and other technical indicators extracted from this document.
IPv4
10.98.134.238Phone
6669994Forum Discussions
This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.